VTechWorks staff will be away for the Thanksgiving holiday beginning at noon on Wednesday, November 27, through Friday, November 29. We will resume normal operations on Monday, December 2. Thank you for your patience.
 

Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity

dc.contributor.authorAdams, Michael D.en
dc.contributor.authorHitefield, Seth D.en
dc.contributor.authorHoy, Bruceen
dc.contributor.authorFowler, Michael C.en
dc.contributor.authorClancy, Thomas Charles IIIen
dc.contributor.departmentElectrical and Computer Engineeringen
dc.contributor.departmentHume Center for National Security and Technologyen
dc.date.accessioned2017-11-17T16:11:23Zen
dc.date.available2017-11-17T16:11:23Zen
dc.date.issued2013-11-01en
dc.description.abstractA significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous ‘cyber cycle’ of attackers scanning networks, developing exploits and attacking systems, with defenders detecting attacks, analyzing exploits and patching systems. This reactive nature leaves sensitive systems highly vulnerable to attack due to un-patched systems and undetected exploits. Some current research attempts to address this major limitation by introducing systems that implement moving target defense. However, these ideas are typically based on the intuition that a moving target defense will make it much harder for attackers to find and scan vulnerable systems, and not on theoretical mathematical foundations. The continuing lack of fundamental science and principles for developing more secure systems has drawn increased interest into establishing a ‘science of cyber security’. This paper introduces the concept of using cybernetics, an interdisciplinary approach of control theory, systems theory, information theory and game theory applied to regulatory systems, as a foundational approach for developing cyber security principles. It explores potential applications of cybernetics to cyber security from a defensive perspective, while suggesting the potential use for offensive applications. Additionally, this paper introduces the fundamental principles for building non-stationary systems, which is a more general solution than moving target defenses. Lastly, the paper discusses related works concerning the limitations of moving target defense and one implementation based on non-stationary principles.en
dc.format.mimetypeapplication/pdfen
dc.identifier.urihttp://hdl.handle.net/10919/80421en
dc.identifier.urlhttps://arxiv.org/abs/1311.0257en
dc.language.isoenen
dc.publisherVirginia Techen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectCyberneticsen
dc.subjectControl Theoryen
dc.subjectFeedbacken
dc.subjectInformation Theoryen
dc.subjectComputer Networksen
dc.subjectComputer Securityen
dc.titleApplication of Cybernetics and Control Theory for a New Paradigm in Cybersecurityen
dc.typeArticleen
dc.type.dcmitypeTexten

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
ClancyApplicationofCybernetics2013.pdf
Size:
934.47 KB
Format:
Adobe Portable Document Format
Description: